<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.35 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-frost-rats-eat-collection-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.3 -->
  <front>
    <title abbrev="EAT Collection">Entity Attestation Token (EAT) Collection Type</title>
    <seriesInfo name="Internet-Draft" value="draft-frost-rats-eat-collection-03"/>
    <author fullname="Simon Frost">
      <organization>Arm</organization>
      <address>
        <email>Simon.Frost@arm.com</email>
      </address>
    </author>
    <date year="2023" month="June" day="09"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>EAT</keyword>
    <keyword>collection container</keyword>
    <abstract>
      <?line 60?>

<t>The default top-level definitions for an EAT <xref target="I-D.ietf-rats-eat"/> assume a hierarchy involving a leading signer within the Attester. Some token use cases do not match that model. This specification defines an extension to EAT allowing the top-level of the token to consist of a collection of otherwise defined tokens.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-frost-rats-eat-collection/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
    </note>
  </front>
  <middle>
    <?line 64?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An Attestation Token conforming to EAT <xref target="I-D.ietf-rats-eat"/> has a default top level definition for a token to be constructed principally as a claim set within a CBOR Web Token (CWT) <xref target="RFC8392"/> with the associated COSE envelope <xref target="STD96"/> providing at least integrity and authentication. An equivalent JSON encoding for a JWT <xref target="RFC7519"/> in a JWS envelope <xref target="RFC7515"/> is supported as an alternative at the top-level definition. The top level token can be augmented with related claims in a Detached EAT Bundle.</t>
      <t>For the use case of transmitting a claim set through a secure channel, the top-level definition can be extended to use an Unprotected CWT Claim Set (UCCS) <xref target="I-D.ietf-rats-uccs"/>.</t>
      <t>This document outlines an additional top-level extension for which neither of the above top level definitions match exactly: the attestation token consists of a collection of objects, each with their own integrity and some internally defined relationship through which the integrity of the whole collection can be determined. i.e. there is no top-level signer for the set. The objects may all share the same logical hierarchy in a device or have a hierarchy which is internally defined within the object set.</t>
    </section>
    <section anchor="terminology-and-requirements-language">
      <name>Terminology and Requirements Language</name>
      <t>Readers are also expected to be familiar with the terminology from <xref target="I-D.ietf-rats-eat"/> and <xref target="RFC9334"/>.</t>
      <t>In this document, the structure of data is specified in CDDL <xref target="RFC8610"/> <xref target="RFC9165"/>.</t>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="design-considerations-use-cases">
      <name>Design Considerations / Use Cases</name>
      <t>Take a device with an attestation system consisting of a platform claim set and a workload claim set, each controlled by different components and with an underlying hardware Root of Trust. The two claim sets are delivered together to make up the overall attestation token. Depending upon the implementation and deployment use case, the signing system can either be entirely centric to the platform RoT or can have separate signers for the two claim sets. In either case, a cryptographic binding is established between the two parts of the token.</t>
      <t>A specific manifestation of such a device is one incorporating the Arm Confidential Compute Architecture (CCA) attestation token <xref target="Arm-CCA"/>. In trying to prepare the attestation token using EAT, there were no issues constructing the claim sets or incorporating them into individual CWTs where appropriate. However, in trying to design an 'envelope structure' to convey the two parts as a single report it was found that maintaining EAT compatibility would require very different shaped compound tokens for different models, for example one based on a submod arrangement and another based on a Detached EAT Bundle, though with different ‘leading’ objects. This would create extra code and explanation in areas where keeping things simple is desirable. There was an alternative approach considered, which stays close to existing thinking on EAT, which would be to create the wrapper from the UCCS EAT extension containing only submods for the respective components. This however stretches the current use case for UCCS beyond its existing description. The RATS WG approach of separating UCCS from the core EAT specification to be an extension also encourages proposing this further extension.</t>
      <t>To support the CCA use case, it is also relevant to consider current attestation technologies which are based on certificate chains (e.g. SPDM, DICE, several key attestation systems). Here also are multiple objects with their own integrity and an internally defined relationship. If attempting to move such a technology to the EAT world, the same challenges apply.</t>
      <t>An additional use case beyond the production of tokens from an Attester occurs when using EAT to convey Attestation Results from a Verifier.
Attestation results may be separated into different sections depending upon what aspects of Appraisal Policy are applied by the Verifier.
For example, the set of validated evidence claims may form one section, while claims reflecting semantic conclusions drawn by an Appraisal Policy could form another section.
Given the role of different authorities in concluding result sections, each could have a different signer rather than all results being under a single signature from the Verifier. In this case, a collection can be used to collate all result sections into a single response message. Using a collection simplifies operations if individual sections from the collated result sections need to be later dispersed to different Relying Parties.</t>
      <t>A further Attestation Result use case can be seen in the "Below Zero Trust" system described in <xref target="I-D.ietf-rats-ar4si"/> where the AR-augmented Evidence credential has compound form.</t>
    </section>
    <section anchor="token-collection">
      <name>Token Collection</name>
      <t>The proposed extension for the top-level definition is to add a 'Token Collection' type. The contents of the type are a map of CWTs (JWTs). The Detached EAT Bundle top-level entry for EAT is included for completeness, and the UCCS extension can also be embraced, though the use cases for these have not been explored. The identification of collection members and the intra collection integrity mechanism is considered usage specific. A verifier will be expected to extract each of the members of the collection and check their validity both individually and as a set. In addition to entries which have their own integrity, it is also
supported to include an unsigned Claims Set, provided that the integrity for that Claims Set is provided
within another entry that uses one of the signed forms.</t>
      <t>A map was chosen rather than an unbounded array to give the opportunity to add identifying map tags to each entry. The interpretation of the tags will be usage specific, but may correspond to registered identities of specific token types. To assist a verifier correlate the expected contents a profile entry can be added as the ‘profile-label’ identity in the map.</t>
      <t>See <xref target="cddl"/> for a CDDL description of the proposed extension.</t>
      <t>While most of the use cases for collections are for scenarios where there will be at least two entries in a collection, the CDDL allows for &gt;= 1 entries in a collection to allow for the scenario where only one entry is currently available even though the normal set is larger.</t>
      <section anchor="binder-definition">
        <name>Binder Definition</name>
        <t>This specification includes a proposal for a Collection Binder claim (see <xref target="fig-binder"/>).
This claim would be included within any collection entry as a definiton of the integrity mechanism that binds that collection entry to another collection entry.
There may be more than one binder claims in a given collection entry.
If a binder is present, a verifier <bcp14>MUST</bcp14> use the information within this claim to drive inter-collection entry integrity checking.
The binders in a collection describe a digraph structure.
The verifier <bcp14>MUST</bcp14> reject a collection that contains loops, i.e., it must make sure that the described structure is a simple directed graph.
This claim would not be mandatory within a collection entry as a verifier may implement the integrity checking based upon information in the profile alone.</t>
        <figure anchor="fig-binder">
          <name>EAT collection binder</name>
          <sourcecode type="cddl"><![CDATA[
; The Collection Binder is a formal declaration of the inter entry
; binding mechanism. It would be included within the body of one or
; more of the collection entries. 
Collection-Binder = [
    binder-function,
    [*binder-source-label],
    destination-collection-entry,
    destination-claim
]

; binder-function is the name/id of a hash algorithm
binder-function = JC<text,int>

; By definition, the binder-function is applied to a concatenation
; of the ordered list of source claims.
; If the array is empty, the function is applied to the whole
; contents of the token.
binder-source-label = Claim-Label

destination-collection-entry = collection-entry-label
destination-claim = Claim-Label

Claim-Label = JC<"text", int>
collection-entry-label = JC<text, int>
JC<J,C> = J .feature "json" / C .feature "cbor"
]]></sourcecode>
        </figure>
        <t>The attributes within the binder claim are:</t>
        <ul spacing="normal">
          <li>
            <tt>binder-function</tt>: the identity of the binding cryptographic function, usually a hash function, applied
to the values identified by the binder-source-label array.</li>
          <li>
            <tt>binder-source-label</tt>: an array defining the set of claims providing the binding information within the
collection entry. It is assumed that the values corresponding to this (ordered) list will be concatenated
and have the binder-function applied to produce a binder value. If the array is empty, the entire source
collection entry is used as input to the binder-function. This latter condition would normally be applied
to a collection entry consisting of a Claim Set.</li>
          <li>
            <tt>destination-collection-entry</tt>: this defines the collection entry that will hold (receive) the binding
for this (source) collection entry.</li>
          <li>
            <tt>destination-claim</tt>: this defines the claim label within destination-collection-entry which will store
the binder value.</li>
        </ul>
        <t>A verifier can check the binding between two collection entries by computing the binder value for one
entry and comparing the result stored within the value of the destination claim (in the destination
collection entry).</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>A verifier for an attestation token must apply a verification process for the full set of entries contained within the Token Collection.
This process will be custom to the relevant profile for the Token Collection and take into account any individual verification per entry and/or verification for the objects considered collectively, including the intra token integrity scheme.
As there is no overall signature for the Collection, protection against malicious modification <bcp14>MUST</bcp14> be contained within the entries.
In general, a secure channel for the conveyance of EAT collections <bcp14>MUST</bcp14> provide at least end-to-end cryptographic integrity.
It is expected that there exists a cryptographic binding between entries, this can for example be one to many or one to one in a (chain) series.
The implementation of creating these bindings may involve passing data across
ABIs. This provides an attack vector on the integrity of the collection which
must be considered within any threat model.
With respect to binder claims, these require integrity protection.
This protection can either be provided by the signature on the token entry
which contains the binder or, in the case where the entry does not have a
signature, by including the binder claim with any other claims when preparing
input into the cryptographic binding function.
Depending upon the use case and associated threat model, the freshness of entries may need extra consideration.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In the registry <xref target="IANA.cbor-tags"/>, IANA is requested to allocate the tag in <xref target="tbl-eat-collection"/> from the FCFS space, with the present document as the specification reference.</t>
      <table align="left" anchor="tbl-eat-collection">
        <name>EAT Collection</name>
        <thead>
          <tr>
            <th align="left">Tag</th>
            <th align="left">Data Item</th>
            <th align="left">Semantics</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD399</td>
            <td align="left">map</td>
            <td align="left">EAT Collection RFCthis</td>
          </tr>
        </tbody>
      </table>
      <section anchor="sec-iana-media-types">
        <name>Media Type Registration</name>
        <t>IANA is requested to register the "application/eat-collection" media type <xref target="RFC2046"/> in the "Media Types" registry <xref target="IANA.media-types"/> in the manner described in <xref target="RFC6838"/>, which can be used to indicate that the content is an EAT collection.</t>
        <t>The new media type extends the set of EAT media types introduced in <xref target="I-D.ietf-rats-eat-media-type"/>.</t>
        <ul spacing="normal">
          <li>Type name: application</li>
          <li>Subtype name: eat-collection</li>
          <li>Required parameters: n/a</li>
          <li>Optional parameters: n/a</li>
          <li>Encoding considerations: binary</li>
          <li>Security considerations: See the Security Considerations section
of RFCthis</li>
          <li>Interoperability considerations: n/a</li>
          <li>Published specification: RFCthis</li>
          <li>Applications that use this media type: Attesters, Relying Parties and Verifiers sending
EAT collection messages over HTTP(S) and other transports.</li>
          <li>Fragment identifier considerations: n/a</li>
          <li>
            <t>Additional information:  </t>
            <ul spacing="normal">
              <li>Magic number(s): n/a</li>
              <li>File extension(s): n/a</li>
              <li>Macintosh file type code(s): n/a</li>
            </ul>
          </li>
          <li>Person &amp; email address to contact for further information:
Simon Frost, Simon.Frost@arm.com</li>
          <li>Intended usage: COMMON</li>
          <li>Restrictions on usage: none</li>
          <li>Author: Simon Frost, Simon.Frost@arm.com</li>
          <li>Change controller: IESG</li>
          <li>Provisional registration?  No</li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-rats-eat">
          <front>
            <title>The Entity Attestation Token (EAT)</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Giridhar Mandyam" initials="G." surname="Mandyam">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Carl Wallace" initials="C." surname="Wallace">
              <organization>Red Hound Software, Inc.</organization>
            </author>
            <date day="19" month="December" year="2022"/>
            <abstract>
              <t>   An Entity Attestation Token (EAT) provides an attested claims set
   that describes state and characteristics of an entity, a device like
   a smartphone, IoT device, network equipment or such.  This claims set
   is used by a relying party, server or service to determine how much
   it wishes to trust the entity.

   An EAT is either a CBOR Web Token (CWT) or JSON Web Token (JWT) with
   attestation-oriented claims.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-19"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049).  Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9165">
          <front>
            <title>Additional Control Operators for the Concise Data Definition Language (CDDL)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The Concise Data Definition Language (CDDL), standardized in RFC 8610, provides "control operators" as its main language extension point.</t>
              <t>The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed:,, and for the construction of constants; / for including ABNF (RFC 5234 and RFC 7405) in CDDL specifications; and for indicating the use of a non-basic feature in an instance.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9165"/>
          <seriesInfo name="DOI" value="10.17487/RFC9165"/>
        </reference>
        <reference anchor="I-D.ietf-rats-eat-media-type">
          <front>
            <title>EAT Media Types</title>
            <author fullname="Laurence Lundblade" initials="L." surname="Lundblade">
              <organization>Security Theory LLC</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer Institute for Secure Information Technology</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>arm</organization>
            </author>
            <date day="10" month="March" year="2023"/>
            <abstract>
              <t>   Payloads used in Remote Attestation Procedures may require an
   associated media type for their conveyance, for example when used in
   RESTful APIs.

   This memo defines media types to be used for Entity Attestation
   Tokens (EAT).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-media-type-02"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized.  This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols.  This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-rats-uccs">
          <front>
            <title>A CBOR Tag for Unprotected CWT Claims Sets</title>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Jeremy O'Donoghue" initials="J." surname="O'Donoghue">
              <organization>Qualcomm Technologies Inc.</organization>
            </author>
            <author fullname="Nancy Cam-Winget" initials="N." surname="Cam-Winget">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="1" month="February" year="2023"/>
            <abstract>
              <t>   CBOR Web Token (CWT, RFC 8392) Claims Sets sometimes do not need the
   protection afforded by wrapping them into COSE, as is required for a
   true CWT.  This specification defines a CBOR tag for such unprotected
   CWT Claims Sets (UCCS) and discusses conditions for its proper use.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-uccs-05"/>
        </reference>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state.  This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims.  It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.ietf-rats-ar4si">
          <front>
            <title>Attestation Results for Secure Interactions</title>
            <author fullname="Eric Voit" initials="E." surname="Voit">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Thomas Hardjono" initials="T." surname="Hardjono">
              <organization>MIT</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Vincent Scarlata" initials="V." surname="Scarlata">
              <organization>Intel</organization>
            </author>
            <date day="2" month="March" year="2023"/>
            <abstract>
              <t>   This document defines reusable Attestation Result information
   elements.  When these elements are offered to Relying Parties as
   Evidence, different aspects of Attester trustworthiness can be
   evaluated.  Additionally, where the Relying Party is interfacing with
   a heterogeneous mix of Attesting Environment and Verifier types,
   consistent policies can be applied to subsequent information exchange
   between each Attester and the Relying Party.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-ar4si-04"/>
        </reference>
        <reference anchor="RFC8392">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties.  The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection.  A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value.  CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
        <reference anchor="STD96">
          <front>
            <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
              <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="96"/>
          <seriesInfo name="RFC" value="9052"/>
          <seriesInfo name="DOI" value="10.17487/RFC9052"/>
        </reference>
        <reference anchor="RFC7519">
          <front>
            <title>JSON Web Token (JWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Token (JWT) is a compact, URL-safe means of representing claims to be transferred between two parties.  The claims in a JWT are encoded as a JSON object that is used as the payload of a JSON Web Signature (JWS) structure or as the plaintext of a JSON Web Encryption (JWE) structure, enabling the claims to be digitally signed or integrity protected with a Message Authentication Code (MAC) and/or encrypted.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7519"/>
          <seriesInfo name="DOI" value="10.17487/RFC7519"/>
        </reference>
        <reference anchor="RFC7515">
          <front>
            <title>JSON Web Signature (JWS)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="J. Bradley" initials="J." surname="Bradley"/>
            <author fullname="N. Sakimura" initials="N." surname="Sakimura"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>JSON Web Signature (JWS) represents content secured with digital signatures or Message Authentication Codes (MACs) using JSON-based data structures.  Cryptographic algorithms and identifiers for use with this specification are described in the separate JSON Web Algorithms (JWA) specification and an IANA registry defined by that specification.  Related encryption capabilities are described in the separate JSON Web Encryption (JWE) specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7515"/>
          <seriesInfo name="DOI" value="10.17487/RFC7515"/>
        </reference>
        <reference anchor="Arm-CCA" target="https://www.arm.com/architecture/security-features/arm-confidential-compute-architecture">
          <front>
            <title>Confidential Compute Architecture</title>
            <author>
              <organization>Arm Ltd</organization>
            </author>
            <date year="2022"/>
          </front>
        </reference>
        <reference anchor="IANA.cbor-tags" target="https://www.iana.org/assignments/cbor-tags">
          <front>
            <title>Concise Binary Object Representation (CBOR) Tags</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="IANA.media-types" target="https://www.iana.org/assignments/media-types">
          <front>
            <title>Media Types</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 243?>

<section anchor="cddl">
      <name>CDDL</name>
      <sourcecode type="cddl"><![CDATA[
$$EAT-CBOR-Tagged-Token /= Tagged-Collection
$$EAT-CBOR-Untagged-Token /= TL-Collection

Tagged-Collection =  #6.TBD399(TL-Collection)

TL-Collection = {
    ? eat-collection-identifier,
    + all-collection-types
}

eat-collection-identifier = (
    profile-label => general-uri / general-oid
)

all-collection-types = (
    cwt-collection-entries //
    jwt-collection-entries //
    claim-set-collection-entries //
    detatched-eat-bundle-collection-entries
)

cwt-collection-entries = (
    collection-entry-label => CWT-Messages
)

jwt-collection-entries = (
    collection-entry-label => JWT-Messages
)

claim-set-collection-entries = (
    collection-entry-label => JC<json-wrapped-claims-set,
                                 cbor-wrapped-claims-set>
)

detatched-eat-bundle-collection-entries = (
    collection-entry-label => BUNDLE-Messages
)

collection-entry-label = JC<text, int>

; The Collection Binder is a formal declaration of the inter entry
; binding mechanism. It would be included within the body of one or
; more of the collection entries.
Tagged-Collection-Binder =  #6.TBD99(Collection-Binder)
Collection-Binder = [
    binder-function,
    [*binder-source-label],
    destination-collection-entry,
    destination-claim
]
; binder function is normally the name/id of a hash algorithm
binder-function = JC<text,int>

; by definition, the binder-function is applied to a concatenation
; of the ordered list of source claims
; If the array is empty, the function is applied to the whole
; contents of the token
binder-source-label = Claim-Label

destination-collection-entry = collection-entry-label

destination-claim = Claim-Label


]]></sourcecode>
      <?line 315?>

</section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Thomas Fossati proposed the inclusion of the Binder definiton and collaborated
on the CDDL. Yogesh Deshpande provided insightful comments and review for this
proposal.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="T." surname="Fossati" fullname="Thomas Fossati">
        <organization>Arm Limited</organization>
        <address>
          <email>thomas.fossati@arm.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
